PCI News

As a small business, you are a prime target for data thieves. When your payment card data is breached, the fallout can strike quickly. Your customers lose trust in your ability to protect their personal information. They take their business elsewhere. There are potential financial penalties and damages from lawsuits, and your business may lose the ability to accept payment cards. A survey of 1,015 small and medium businesses found 60% of those breached close in six months. (NCSA)

Depending on where in the world you are located, equipment used to take payments is called by different names. Here are the types we reference in this document and what they are commonly called.

A PAYMENT TERMINAL is the device used to take customer card payments via swipe, dip, insert, tap, or manual entry of the card number. Point-of-sale (or POS) terminal, credit card machine, PDQ terminal, or EMV/chip-enabled terminal are also names used to describe these devices.

An ELECTRONIC CASH REGISTER (or till) registers and calculates transactions, and may print out receipts, but it does not accept customer card payments.

An INTEGRATED PAYMENT TERMINAL is a payment terminal and electronic cash register in one, meaning it takes card payments, registers and calculates transactions, and prints receipts.

A PAYMENT SYSTEM encompasses the entire process for accepting card payments in a retail location (including stores/shops and e-commerce storefronts), and may include a payment terminal, an electronic cash register, other devices or systems connected to a payment terminal (for example, Wi-Fi for connectivity or a PC used for inventory), servers with e-commerce components such as payment pages, and the connections out to the merchant bank.

Start protecting your business today with these security basics:

Use strong passwords and change default ones

Protect your card data and only store what you need

Inspect payment terminals for tampering

Install patches from your vendors

Use trusted business partners and know how to contact them

Protect in-house access to your card data

Don’t give hackers easy access to your systems

Use anti-virus software

Scan for vulnerabilities and fix issues

Use secure payment terminals and solutions

Protect your business from the Internet 

For the best protection, make your data useless to criminals